Author of the publication

Infrared Weak-Small Targets Fusion Based on Latent Low-Rank Representation and DWT.

, , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study on IR Target Recognition Approach in Aerial Jamming Environment Based on Bayesian Probabilistic Model., , , and . IEEE Access, (2019)Role-Oriented Workflow Modeling Based on Object Petri Net., , and . ICYCS, page 837-843. IEEE Computer Society, (2008)A Web Performance Modeling Process Based on the Methodology of Learning from Data., , , and . ICYCS, page 1285-1291. IEEE Computer Society, (2008)Biomechanical investigation on the corneal symmetry factors., , , and . BIBE, page 37-40. IEEE, (2022)Investigation of the Optic Nerve Head Morphology Influence to the Optic Nerve Head Biomechanics - Data Observation and Analysis., , and . BIBE, page 33-36. IEEE, (2022)A Fair Item-Item Exchange Protocol Satisfying Newly Introduced Requirements., , , and . ICITA (2), page 502-507. IEEE Computer Society, (2005)Goal Description Language for Semantic Web Service Automatic Composition., , and . SAINT, page 190-196. IEEE Computer Society, (2005)Pattern Semantic Link: A Reusable Pattern Representation in MDA Context., , , and . ICDCIT, volume 3347 of Lecture Notes in Computer Science, page 310-317. Springer, (2004)Human Activity Recognition Based on Smart Phone's 3-Axis Acceleration Sensor., , , , and . SmartCom, volume 10135 of Lecture Notes in Computer Science, page 163-172. Springer, (2016)Long and Short Term Risk Control for Online Portfolio Selection., , , , and . KSEM (2), volume 12275 of Lecture Notes in Computer Science, page 472-480. Springer, (2020)